Mahesh V. Tripunitara and Samuel S. Wagsta, Jr. COAST Laboratory. Purdue University. COAST TR-98/01.

Size: px
Start display at page:

Download "Mahesh V. Tripunitara and Samuel S. Wagsta, Jr. COAST Laboratory. Purdue University. COAST TR-98/01."

Transcription

1 The Compression Functions of SHA, MD, MD4 and MD5 are not Ane Mahesh V. Tripunitara and Samuel S. Wagsta, Jr. COAST Laboratory Purdue University West Lafayette, IN COAST TR-98/01 Abstract In this paper, we show that the compressions functions of SHA, MD, MD4 and MD5 are not ane transformations of their inputs. 1 Introduction The Secure Hash Algorithm (SHA) [1, 5, ] and the Message Digest algorithms MD [4], MD4 [6] and MD5 [7], are used to produce a message digest, a condensed form of a message for use in digital signature and other applications. Figure 1 shows how these algorithms are used. Each step in each of the algorithms is a compression function (denoted by CF in the gure) which takes as inputs a (portion of a) message and the current value for a chaining variable. Each compression function alters the value for the chaining variable based on the input message, and the output from each compression function is this altered value for the chaining variable. The value for the chaining variable from the last application of the compression function is the output message digest. The initial value for the chaining variable for the rst application of the compression function is xed for each algorithm and each subsequent application uses the output from the previous application as input value for the chaining variable. An important property for each such compression function to possess is for the output to not be an ane transformation of the inputs, which are a xed size (portion of a) message and the initial value for the chaining variable. If the output from a compression function is an ane transformation of its inputs, it would be trivial to construct messages that produce a given message digest when subjected to the message digest algorithm as we show in section 1.. Such an algorithm would be useless in a security context. In this paper we show that the compressions functions of the message digest algorithms SHA, MD, MD4 and MD5 as described in [1], [4], [6] and [7] respectively are indeed not ane. 1.1 Some Characteristics of the Algorithms Each algorithm takes an arbitrary length (we use \length", \size" and \number of bits" to mean the same unless specically noted otherwise) message as input and produces a xed length message digest as output. The message digest is 160 bits for SHA and 18 bits for each of MD, MD4 and MD5. Each algorithm pads the input message such astomake the number of bits in the message plus the padamultiple of 51 in the case of SHA, MD4 and MD5, and a multiple of 18 in the case of MD. Portions of this work were supported by sponsors of the COAST Laboratory. 1

2 Message Pad M M M M M L L L L L Initial Default CF CF CF CF CF Value for Chaining Variable L Final Digest M = 51 bits for SHA, MD{4,5} M = 18 bits for MD L = 160 bits for SHA L = 18 bits for MD{,4,5} Figure 1: Use of Message Digest Algorithms For SHA, MD4 and MD5, the padding consists of a 1 (bit) followed by enough 0's to make the number of bits of the message plus the pad (so far) 448 mod 51. At least 1 bit and at most 51 bits are thus added as pad. The length of the (original) message represented as a 64 bit number is then appended to make the entire length a multiple of 51. In the case of MD, padding of sucient length to make the number of bits of the padded message a multiple of 18 is added. Thus, if i bytes are added as pad, each of those bytes has the value i. At least 1 byte and at most 16 bytes are appended as pad. A 16 byte (18 bit) checksum of the message plus pad is also then appended. After padding, SHA, MD4 and MD5 break the padded message into 51 bit chunks and use those as inputs to the compression function, in turn, as indicated in gure 1. MD also does the same, except that its compression function takes 18 bit chunks of the message as input. Each compression function also takes as input the value of the chaining variable which is the output from the previous application of the compression function. For the rst application of the compression function, each algorithm uses a default initial value for the chaining variable. 1. An Attack on a Message Digest Algorithm That Uses an Ane Compression Function In this section, we assume the existence of a message digest algorithm, A that works like SHA, MD, MD4 and MD5 in that it takes as input a message of some length, pads the message and breaks the padded message into equal sized chunks to use as input to a compression function, CF. CF also takes as input a chaining variable that is the output from the previous application of CF (a default value for the rst application). Also, we assume that CF is ane in its inputs, that is, CF can be represented as a pre-multiplication by a matrix of appropriate dimensions bitwise XOR-ed with a vector of appropriate size. Then, given a message and its corresponding message digest, we construct a second message with the same message digest. We assume that the reader is familiar with basic concepts of numerical linear algebra such asrank of a matrix and Gaussian Elimination. We refer the reader to [] for a review of these and other related topics. Also, we adopt the following notation: F n;m : The set of n m matrices each of whose elements are in F, the Galois Field with the two elements 0 and 1. m is omitted if it is 1, and n and m are omitted if they are both 1. : The (bitwise) exclusive-or operator. jj: A function that takes as argument a bit string or bit vector and returns its length. : Used to concatenate bit strings.

3 A: The message digest algorithm with an ane compression function. M; M 0 ;M 00 : Inputs to A (messages of some length). D: Output from A (message digest). CF: The compression function used in A. m; m i : Input message to CF,typically a portion of M, M 0 or M 00, written as a bit vector. v; v i : Input chaining variable to CF written as a bit vector. w; w i : Output from CF written as a bit vector. The output from the nal application of CF is the message digest. L m : The length of the input message to CF. Thus, typically, L m = jm i j and L m = 51 for SHA, MD4 and MD5 and L m = 18 for MD. L v : The length of the input chaining variable to and thus, the output from, CF. Thus, L v = jv i j = jw j j for any i; j. L v = 160 for SHA and L v = 18 for MD, MD4 and MD5. p: The padding added to the message. For SHA, MD4 and MD5, 65 jpj 576 and for MD, 16 jpj 56. C: The matrix corresponding to CF. Thus, C F Lv;(Lv+Lm). C i : The i th column of C, where 1 i (L v + L m ). Thus, C i F Lv and C = C1 C ::: C (Lv+Lm). b: The constant vector corresponding to the ane transformation, CF. Thus, b is the output on input 0 (the vector of all 0's), and b F Lv. Thus, CF, on inputs v, m and output w can now be expressed as: w = C 1 C ::: C (Lv+Lm) v m b (1) Assume that some message M on input to A produces D as message digest. We would like to substitute our favorite message, M 0 for the original message, but have the new message also produce the same output D on input to A. Of course, this is not possible in general. Therefore, starting from our favorite message M 0,we construct M 00, a slightly transformed version of M 0, such that M 00 on input to A, produces D as message digest. Starting with M 0,we carry out the attack as follows. 1. We split M 0 into chunks of size L m. Thus, we produce m 1 ;m ;:::;m k such that jm i j = L m for i =1; ;:::;k, 1, jm k jl m and m 1 m ::: m k = M 0.. We subject each ofm 1 ;m ;:::;m k,1 to CF, in turn. At the rst application, we use the default value for the input chaining variable and at each subsequent application, we use the output from the previous application of CF. Application of CF is carried out as indicated in (1). The output from the last such application of CF is w k,1 = v k, which is the same as the input chaining variable to the next application of CF. Thus, we have now performed k, 1 applications of CF.. If A works like SHA, MD4 or MD5, the message is rst padded with at least one bit so that it is of length 448 mod L m, and then with the length of the message represented as a 64 bit number (of course, L m = 51 for SHA, MD4 and MD5). Our strategy is to append a suitable \noise" to the message. We now need to consider one of several cases as described below. (a) If the next (k th ) application of CF is to be the last, we require the output from the application to be D. Thus, we need to nd a \noise" n such that: v k 6 m C1 C ::: C 6 k (Lv+Lm) 4 n p = D b ()

4 To be able to nd such an n, we need the following condition to be satised: rank, C (Lv+jmkj+1) C (Lv+jmkj+) ::: C (Lv+Lm,jpj) = rank(c) () We may assume that p is of minimum length, that is jpj = 65. If () is true, we are left with a consistent system of linear equations in the components (bits) of n, for any D. That is, if n = n 1 n ::: n t T, where t =(Lm,jm k j,jpj) and each n i F, i =1; ;:::;t, then () can be rewritten as: n 1 C (Lv+jmkj+1) n C (Lv+jmkj+) ::: n t C (Lv+Lm,jpj) =,, D b C1 C ::: C Lv vk C(Lv+1) C (Lv+) ::: C (Lv+jmkj) mk, C(Lv+Lm,jpj+1) C (Lv+Lm,jpj+) ::: C (Lv+Lm) p (4) We now pick rank(c) non-trivial equations in n 1 ;n ;:::;n t from (4) and solve them using Gaussian Elimination. Note that we are guaranteed that the system of equations (4) will be consistent because of (). If rank(c) < jnj, then jnj,rank(c) ofn 1 ;n ;:::;n t are chosen arbitrarily. (b) If () cannot be satised (perhaps because jnj is too small), we rst pick an arbitrary \noise" n of length L m,jm k j and compute: w k = v k+1 = C 4 v k m k n Now, we attempt to nd an additional \noise" n 0 such that: C1 C ::: C 4 (Lv+Lm) 5 b (5) v k+1 n 0 p 5 = D b (6) Again, we may assume that p is of minimum length. For n 0 in (6) to be found, we need for the following condition to hold: rank, C (Lv+1) C (Lv+) ::: C (Lv+Lm,jpj) = rank(c) (7) If the condition (7) is satised, n 0 can be computed by solving the system of linear equations suggested by (6), similar to the previous case. (c) If (7) cannot be satised, we rst choose some n with jnj = L m,jm k j and compute w k = v k+1 as indicated in (5). Similar to the previous case, we seek to incorporate additional \noise" n 0 and n 00 with jn 0 j = L m and jn 00 j = L m,jpj such that: C vk+1 n 0 = w k+1 b = v k+ b C 4 v k+ n 00 p 5 = D b (8) For us to be able to nd appropriate n 0 and n 00,we require the following to be true: rank, C 1 ::: C (Lv+Lm,jpj) = rank, C(Lv+1) ::: C (Lv+Lm) = rank(c) (9) 4

5 (d) If (9) cannot be satised, this implies that some bits in D b depend solely on either the input chaining variable or the last few bits that correspond to the padding p in the last application of CF. For the bits in Db that are a function of only the input chaining variable, all we need to make sure is that M 00 involves the same number of applications of CF as M in producing a message digest, that is, jm 00 + paddingj = jm + paddingj. Similarly, for the bits in D b that are a function of the padding, we only need to make sure that the padding added for M 00 is the same as that for M, which will be the case if jm 00 j = jm j. This restricts our choices for M 0, from which M 00 is constructed. Note that the condition jm 00 j = jm j is sucient, but not necessary. Thus, if A is similar to SHA, MD4 or MD5, we have shown how to construct a new message M 00 that results in the same message digest D as a given message M. 4. The cases for when A works like MD are similar. Thus, we have shown that a message digest algorithm that employs a compression function that is ane in its inputs can be easily subverted. In the next section, we conrm that fortunately, the widely used message digest algorithms SHA, MD, MD4 and MD5 do not employ compression functions that are ane in their inputs. The Compression Functions of SHA, MD, MD4 and MD5 are not Ane The input to each compression function can be perceived as a (bit) vector that is the member of a vector space of dimension L v + L m, where L m = 51 for SHA, MD4 and MD5, L m = 18 for MD, L v = 160 for SHA and L v = 18 for MD, MD4 and MD5. The output of the compression function is a member of a vector space of dimension L v.we show that each compression function, CF, is not an ane transformation by picking three inputs x 1 ;x ;x such that the property CF(x 1 ) CF(x ) CF(x )= CF(x 1 x x ) is violated. Appendix A shows such sets of three inputs for each of the algorithms. Since that property must hold for a transformation to be ane, and since we can nd x 1 ;x ;x that violate that property for each of the compression functions of SHA, MD, MD4 and MD5, we have proved the following theorem. Theorem.1 The compression functions of SHA, MD, MD4 and MD5 are not ane. References [1] Proposed Federal Information Processing Standard for Secure Hash Standard. Federal Register, 57(1), January 199. [] Proposed Revision of Federal Information Processing Standard (FIPS) 180, Secure Hash Standard. Federal Register, 59(11), July [] Gene H. Golub and Charles F. Van Loan. Matrix Computations. The Johns Hopkins University Press, second edition, [4] B. Kaliski. RFC-119 The MD Message-Digest Algorithm. Network Working Group, April 199. [5] National Institute of Standards and Technology. NIST FIPS PUB 180, Secure Hash Standard. U.S. Department of Commerce, May [6] R. Rivest. RFC-10 The MD4 Message-Digest Algorithm. Network Working Group, April 199. [7] R. Rivest. RFC-11 The MD5 Message-Digest Algorithm. Network Working Group, April

6 A Inputs to the Compression Functions that Show that they are not Ane This section lists the sets of inputs x 1 ;x ;x for each of the compression functions, CF, of SHA, MD, MD4 and MD4 such that the property CF(x 1 ) CF(x ) CF(x )=CF(x 1 x x ) is violated. Note that each x i is 67 bits (twenty one -bit words) for SHA, 56 bits (eight -bit words) for MD, and 640 bits (twenty -bit words) for MD4 and MD5. SHA: MD: MD4: 0x17FC1BE 0x0B46E0A5 0x680F780 0x0AC1A10 0x0CEF56F 0x71CAB 0x04D7CFC0 0x0E1091E6 0x1E8DA0C 0xE6670E6 0x1441E48 0x40A48 0x09878EA 0x5CB95 0xD4065A1 0xAB668 0x1DA8F1A 0x041E7F1 0xFFDB 0x001AA0 0xF8A7F6 0x097911B 0x06F1B 0x1E8796E5 0x55FCC7 0x49B588C 0x1A11C15C 0x746DB51 0x7ABBF8 0x780BAC 0x4B8910E 0x008FCB 0xD05EF 0x09415E 0x5C76A6 0x0CAF851 0x01A5F7 0xD6B5DE9 0xF xD6DF1 0x x00ADA04F 0x0E9AF8AF 0x0EA x0690 0x144AC8F 0x5F48C17 0xE4694B 0x419BD 0x1C99BC4 0x5AAF55 0x0A5501D9 0x11875EA 0x5F86 0x1A7A790B 0xE985 0x0D6E56B 0x1C9B966 0x xEAEB10F 0x8B758B 0x98BF674 0x4E17DB4 0x1A87D98 0x16D19D6 0x17CF5CF4 0x0114CC 0x0468A4 0x0A456E11 0xF766D 0x0C81184A 0x06811F 0x0D779C0 0x65F05B 0x x1A9EE15 0x1DD7BE 0x1CC6CBD 0xD7DBF9 0x06695EDD 0x097700F1 0x5118 0x6FDFB57 0x7671FA 0x0966DCB 0x0DDE6C 0x0F446B76 0xA x1DB19C8C 0xAA1090E 0xEFB8011 0x4105FBE 0x0155AB 0xA78FC 0xD9E0908 0x45558D6 0xCB7CCA 0x080E10E9 0x9E11EF 0xCF89D1 0x180E0 0xE5ED 0x16AED0 0x0D61F5 0x0ADC17 0x154 0x168F0EF 0x0C76AA54 0xE5B8FA 0x0FDF95 0x17E04A 0x0A5A79A 0x4F0447 0x8DBFA9 0x81DE716 0xAD8A6 0xD6C7 0xBF5AC70 0x1FDD5D41 0x0D1A81 0x01F959ED 0x06FB065 0x68D75 0x1DA x671A5B 0x096560E 0x0E0EB09 0x1EA8 0xD978C5C 0x5CB81 0x699A5A0 0x06557EE 0x1CD9C56A 0x0FBDDB 0xA96EB87 0x01E9ED4D 0xA6A45A8 6

7 MD5: 0x1F5AA8C9 0x0160AC9 0xCEA1 0xC4166 0x17DF601 0x1EC1FC5D 0x114DB9 0x0C905AA1 0x7A4BC8 0x0F91D5A5 0x7BECA4 0x0F00C1 0x048888EF 0x1E8BA477 0x1B0DA6 0x1C8DD10 0x005C00A 0x17F9A0 0x1F844CD 0x0AD7B7 0x1814CEB 0x05489ABA 0xA90 0x5BAD080 0x08E x01E89AC 0x00C14D98 0x06F4F74D 0x15EAD09B 0x8A467 0x07E9045 0x194B69F 0xB7B6D 0x71FE78 0x10CFFB 0x089B7991 0x0D6F8A6 0x17BC6B 0x09E41B5 0x15ED6DB 0x0D x4D x1E454DAC 0x8B6485 0xA6A175 0xDCB096 0xD7056 0xA58B65 0x0D8854 0x07E5698F 0x195EB8A4 0x8BBDBA0 0x51C0FD 0x1FD19FB8 0x0614B4C1 0x10D4A 0x1AA161B 0xFE99FD7 0xB899B98 0x180CD49 0x05795DB6 0x1EEC7B8F 0x1D4494D 0x90FE0DB 0x0EDA88F 0x16BD5ADC 0x0F9F9DC1 0x0AC8DC 0xAEF0B6 0x86B99 7

Keywords: CRC, CRC-7, cyclic redundancy check, industrial output, PLC, programmable logic controller, C code, CRC generation, microprocessor, switch

Keywords: CRC, CRC-7, cyclic redundancy check, industrial output, PLC, programmable logic controller, C code, CRC generation, microprocessor, switch Keywords: CRC, CRC-7, cyclic redundancy check, industrial output, PLC, programmable logic controller, C code, CRC generation, microprocessor, switch APPLICATION NOTE 6002 CRC PROGRAMMING FOR THE MAX14900E

More information

RS232C Serial Interface for Pirani Diaphragm and Pirani Standard Gauges. Caution. binary 8 data bits 1 stop bit no parity bit no handshake

RS232C Serial Interface for Pirani Diaphragm and Pirani Standard Gauges. Caution. binary 8 data bits 1 stop bit no parity bit no handshake General Information The Serial Interface allows the communication of the digital Agilent Pirani Capacitance Diaphragm Gauges (PCG-750, PCG-752) and the digital Agilent Pirani Standard Gauges (PVG-550,

More information

Diagnostic Port Serial Interface for Capacitance Diaphragm Gauges

Diagnostic Port Serial Interface for Capacitance Diaphragm Gauges Communication Protocol Diagnostic Port Serial Interface for Capacitance Diaphragm Gauges CDG025D-X3 4-20 ma Current Loop Stripe CDG045Dhs Stripe CDG100Dhs tira84e1 (2017-05) 1 General Information The Diagnostic

More information

Chapter 2: Secret Key

Chapter 2: Secret Key Chapter 2: Secret Key Basics Block or Stream? Secret Key Methods Salting AES Key Entropy Prof Bill Buchanan OBE http://asecuritysite.com/crypto02 http://asecuritysite.com/encryption Conclusion Encryption

More information

SXH Protocol by Spinel Version 3.0 Date:

SXH Protocol by Spinel Version 3.0 Date: SXH Protocol by Spinel Version 3.0 Date:.8 Revision History Vision Date Description V.0 V.0 V3.0 September, 6 December, 6 April, 8 Initial release Added LED control, OSD, Cmd 0x30 Added all ratio image

More information

variable 1. Start of Packet - is used to provide synchronization when parsing packets. Always 0xFC

variable 1. Start of Packet - is used to provide synchronization when parsing packets. Always 0xFC DreamScreen V2 WiFi UDP Protocol The DreamScreen-WiFi platform uses UDP unicasting and broadcasting over the WLAN to provide communication. Port 8888 is used for both sending and receiving. The DreamScreen

More information

Heat meter PolluStat M-bus communication protocol description

Heat meter PolluStat M-bus communication protocol description Heat meter PolluStat M-bus communication protocol description 1 1. General structure of protocol 1.1. General features of protocol Meter uses a M-bus protocol. Default baud rate: 2400 bps, Even, 1 Stop.

More information

MTR-4. C8 Command to MODBUS Bridge User Manual F-1, No. 631, Chung Der Road, Sec 1, Taichung Taiwan.

MTR-4. C8 Command to MODBUS Bridge User Manual F-1, No. 631, Chung Der Road, Sec 1, Taichung Taiwan. MTR-4 C8 Command to MODBUS Bridge User Manual 404 19F-1, No. 631, Chung Der Road, Sec 1, Taichung Taiwan. TEL:886-4-2238-0698 FAX:886-4-2238-0891 Web Site:http://www.monicon.com.tw E-mail: sales@monicon.com.tw

More information

ID: Sample Name: Q3dY56x3hp Cookbook: defaultlinuxfilecookbook.jbs Time: 04:08:56 Date: 21/08/2018 Version:

ID: Sample Name: Q3dY56x3hp Cookbook: defaultlinuxfilecookbook.jbs Time: 04:08:56 Date: 21/08/2018 Version: ID: 73304 Sample : Q3dY56x3hp Cookbook: defaultlinuxfilecookbook.jbs Time: 04:08:56 Date: 21/08/2018 Version: 23.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection

More information

PLC Lite Host Message Protocol Specification

PLC Lite Host Message Protocol Specification PLC Lite Host Message Protocol Specification Version 0.6 Oct. 20, 2014 Copyright Texas Instruments Incorporated, 2009-2014 The information and/or drawings set forth in this document and all rights in and

More information

MCW Application Notes 24 th February 2017

MCW Application Notes 24 th February 2017 MCW Application Notes 24 th February 2017 www.motorcontrolwarehouse.co.uk Document number MCW-HEDY-001 Revision 0.1 Author Gareth Lloyd Product HEDY HD700 Title Summary HEDY HD700 Modbus Serial Communications

More information

GNetPlus Communication Protocol

GNetPlus Communication Protocol Basic Package (BINARY VERSION) Master Query Package (HOST) Field Header Address Query Function Data length DATA BYTES Error Check Desc SOH 0~255 0~255 0~255 CRC16_Low CRC16_Hi Size 1 BYTE 1 BYTE 1 BYTE

More information

variable 1. Start of Packet - is used to provide synchronization when parsing packets. Always 0xFC

variable 1. Start of Packet - is used to provide synchronization when parsing packets. Always 0xFC DreamScreen V2 WiFi UDP Protocol Rev 2 The DreamScreen-WiFi platform uses UDP unicasting and broadcasting over the WLAN to provide communication. Port 8888 is used for both sending and receiving. The DreamScreen

More information

RS232C / RS485C Serial Interface for Cold Cathode and Cold Cathode Pirani Gauges

RS232C / RS485C Serial Interface for Cold Cathode and Cold Cathode Pirani Gauges Communication Protocol RS232C / RS485C Serial Interface for Cold Cathode and Cold Cathode Pirani Gauges MAG500, MAG504 MPG500, MPG504 tira83e1-a (2017-06) 1 General Information The Serial Interface allows

More information

CTT MODBUS-RTU COMMUNICATION PROTOCOL TEMPERATURE MONITOR DEVICE

CTT MODBUS-RTU COMMUNICATION PROTOCOL TEMPERATURE MONITOR DEVICE INSTRUCTION MANUAL IM149-U v0.92 CTT MODBUS-RTU COMMUNICATION PROTOCOL TEMPERATURE MONITOR DEVICE Firmware version: v3.0 or higher MODBUS PROTOCOL Modbus is a master-slave communication protocol able to

More information

Flexi Soft T E L E G R A M M L I S T I N G

Flexi Soft T E L E G R A M M L I S T I N G T E L E G R A M M L I S T I N G This document is protected by the law of copyright, whereby all rights established therein remain with the company SICK AG. Reproduction of this document or parts of this

More information

RS232C / RS485C Serial Interface for Pirani Capacitance Diaphragm and Pirani Standard Gauges

RS232C / RS485C Serial Interface for Pirani Capacitance Diaphragm and Pirani Standard Gauges Communication Protocol RS232C / RS485C Serial Interface for Pirani Capacitance Diaphragm and Pirani Standard Gauges PCG550, PCG552, PCG554 PSG550, PSG552, PSG554 RS485C RS232C tira59e1-a (2017-04) 1 General

More information

SIMCom_3G_CSD_Application Note_V1.00

SIMCom_3G_CSD_Application Note_V1.00 SIMCom_3G_CSD_Application Note_V1.00 Document Title: SIMCom_3G_CSD_Application Note Version: 1.00 Date: Status: Document Control ID: Release SIMCom_3G_CSD_Application Note_V1.00 General Notes SIMCom offers

More information

Using the USB and Serial Interfaces

Using the USB and Serial Interfaces Using the USB and Serial Interfaces PulsON 300 and 400 Series TIME DOMAIN Cummings Research Park 4955 Corporate Drive Suite 101 Huntsville, AL 35805 USA http://www.timedomain.com Tel: +1 256.922.9229 +1

More information

imetos LoRa Data payload structure

imetos LoRa Data payload structure imetos LoRa Data payload structure Pessl Instruments, GmbH Version 1.0, 06-2018 Content 1. SCOPE OF THIS DOCUMENT... 2 2. PARSING THE DATA FROM THE PAYLOAD VERSUS API DATA ACCESS... 3 3. IMETOS LORA FIRMWARE

More information

TBS Unify Pro / SmartAudio

TBS Unify Pro / SmartAudio TBS Unify Pro / SmartAudio 02.12..2017 Revision 08 SmartAudio uses single wire half duplex communication based on UART. In Idle mode both host and VTX define the SmartAudio pin as input. If the host want

More information

RS-232 Control of the Advantage EQ281/8, EQ282/8 and Advantage SMS200

RS-232 Control of the Advantage EQ281/8, EQ282/8 and Advantage SMS200 RS-232 Control of the Advantage EQ281/8, EQ282/8 and Advantage SMS200 Biamp Systems, 14130 N.W. Science Park, Portland, Oregon 97229 U.S.A. (503) 641-7287 an affiliate of Rauland-Borg Corp. Introduction

More information

Signed/Unsigned Integer Arithmetic in C. Vineel Kovvuri

Signed/Unsigned Integer Arithmetic in C. Vineel Kovvuri Signed/Unsigned Integer Arithmetic in C Vineel Kovvuri http://vineelkovvuri.com Contents 1 Introduction 2 2 How signed-ness is represented in the hardware? 2 3 How signed-ness is interpreted in assembly?

More information

Verve IPAC Plug-in Wireless AC Module. Software Setup 3. DolphinView Software 3. Preparations 4 Transmit LINK Signals 4.

Verve IPAC Plug-in Wireless AC Module. Software Setup 3. DolphinView Software 3. Preparations 4 Transmit LINK Signals 4. Verve IPAC Plug-in Wireless AC Module Wireless Linking & Configuration Guide Table of Contents IPAC Configuration Settings 2 Configuration Settings Reference Table 2 Software Setup 3 DolphinView Software

More information

APPENDIX- A REFERENCE IMPLEMENTATION OF BSF-128 ===============================================================

APPENDIX- A REFERENCE IMPLEMENTATION OF BSF-128 =============================================================== APPENDICES A p p e n d i c e s P a g e 144 A p p e n d i c e s P a g e 145 APPENDIX- A REFERENCE IMPLEMENTATION OF BSF-128 =============================================================== REFERENCE IMPLEMENTATION

More information

Ethernet to Digital I/O and Analog Input. (Model: IP-IO)

Ethernet to Digital I/O and Analog Input. (Model: IP-IO) Ethernet to Digital I/O and Analog Input (Model: IP-IO) Feature: Operation voltage : DC 7V ~ 36V. Analog Interface: Interface : 3.3V levels compatibility. Resolution : 16-bits Σ-Δ A/D converters. Accuracy

More information

Control Flow Integrity with ptrace()

Control Flow Integrity with ptrace() Control Flow Integrity with ptrace() Sebastian Krahmer krahmer@suse.de May 18, 2006 Abstract Control Flow Integrity (CFI) is a new technology to ensure a certain execution flow of a program. One of its

More information

HDLC BCC 15.1 Data Link Protocol Description

HDLC BCC 15.1 Data Link Protocol Description Data Link Protocol Description by Daniel L. Henry Revision 1.1 October 9, 2011 Copyright 2000-2011 by Daniel L. Henry Revision History Rev. Date Changed By Reason for Change 1.0 5/9/03 Dan L. Henry Made

More information

Technical Specification. Third Party Control Protocol. AV Revolution

Technical Specification. Third Party Control Protocol. AV Revolution Technical Specification Third Party Control Protocol AV Revolution Document AM-TS-120308 Version 1.0 Page 1 of 31 DOCUMENT DETAILS Document Title: Technical Specification, Third Party Control Protocol,

More information

Interface Control Document

Interface Control Document Interface Control Document CR8200 Engine-based products D026166 CR8200 Interface Control Document ICD.docx Page 1 of 14 TABLE OF CONTENTS 1 Scope... 3 2 Communication Medium... 3 3 Reader to Host Communication...

More information

Highlights. FP51 (FPGA based 1T 8051 core)

Highlights. FP51 (FPGA based 1T 8051 core) Copyright 2017 PulseRain Technology, LLC. FP51 (FPGA based 1T 8051 core) 10555 Scripps Trl, San Diego, CA 92131 858-877-3485 858-408-9550 http://www.pulserain.com Highlights 1T 8051 Core Intel MCS-51 Compatible

More information

Request for Comments: XXXX November Registration of a Georgian Character Set draft-giasher-geostd8-00.txt

Request for Comments: XXXX November Registration of a Georgian Character Set draft-giasher-geostd8-00.txt Internet draft Gia Shervashidze Network Working Group Georgian Internet Avenue Request for Comments: XXXX November 2001 Registration of a Georgian Character Set draft-giasher-geostd8-00.txt Status of this

More information

Modbus Protocol Guide for ZP2 Series Control Panels

Modbus Protocol Guide for ZP2 Series Control Panels Modbus Protocol Guide for ZP2 Series Control Panels P/N 00-3243-505-2603-01 ISS 14DEC15 Copyright Trademarks and patents Manufacturer Version REV 01 Certification 2015 UTC Fire & Security. All rights reserved.

More information

AD-SM2400AP02A-PWRLN. Application Note. SM2400 Bootloader User Guide. Overview

AD-SM2400AP02A-PWRLN. Application Note. SM2400 Bootloader User Guide. Overview AD-SM2400AP02A-PWRLN Application Note Communication Technology by: Semitech Semiconductor Revision 1.0 August 2016 Overview This application note describes the SM2400 Bootloader modes, interface, and protocols,

More information

Input Channels: 4 differential or four single-ended. Address / Baud rate / range configurable by the user

Input Channels: 4 differential or four single-ended. Address / Baud rate / range configurable by the user DAM-Series User Manual Amazing Electronic (HK) Limited User s Manual Overview: DAM module is a new generation data acquisition and control system based on modular embedded systems. Adopting standard DIN35

More information

//

// ----------------------------------------------------------------------------------- Filename: FixedMath.h ----------------------------------------------------------------------------------- -----------------------------------------------------------------------------------

More information

// and verify that there is a sine wave with frequency <FREQUENCY> and

// and verify that there is a sine wave with frequency <FREQUENCY> and F330DC_IDA0_SineWave.c Copyright 2006 Silicon Laboratories, Inc. http:www.silabs.com Program Description: This program outputs a sine wave using IDA0. IDA0's output is scheduled to update at a rate determined

More information

DMTME Multimeters. Communication protocol. Technical specification V1.2 ABB

DMTME Multimeters. Communication protocol. Technical specification V1.2 ABB DMTME Multimeters Communication protocol ABB 1 Setting up DMTME serial communication.3 1.1 Serial network ID programming...3 1.2 RS-485 communication interface...3 1.3 Serial line connection...3 2 Communication

More information

1 SETTING UP GENERAL FUNCTION TYPE PROTOCOL MESSAGES COMMAND RETURN CODES... 6 TRANSACTION EXAMPLES...

1 SETTING UP GENERAL FUNCTION TYPE PROTOCOL MESSAGES COMMAND RETURN CODES... 6 TRANSACTION EXAMPLES... 1 SETTING UP... 3 1.1 RS232 CONTROL CABLES...3 1.2 RS232 SETTINGS...3 2 GENERAL... 4 3 FUNCTION TYPE... 4 4 PROTOCOL MESSAGES... 4 4.1 MESSAGE FORMATS...4 4.1.1 Message Head...4 4.1.2 Message Body...5

More information

Salsa20 security. Daniel J. Bernstein

Salsa20 security. Daniel J. Bernstein Salsa20 security Daniel J. Bernstein Department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago Chicago, IL 60607 7045 snuffle@box.cr.yp.to 1 Introduction

More information

RS-232 Control of the Advantage DRI

RS-232 Control of the Advantage DRI RS-232 Control of the Advantage DRI Biamp Systems, 14130 N.W. Science Park, Portland, Oregon 97229 U.S.A. (503) 641-7287 an affiliate of Rauland-Borg Corp. Introduction This document contains technical

More information

BC3G-US-SMA API. Rev 2.0

BC3G-US-SMA API. Rev 2.0 BC3G-US-SMA API Rev 2.0 28/10/2015 Table of Contents Table of Contents... 2 1. Product revision history... 4 2. How to use this document... 4 3. Serial Protocol Definition... 5 3.1. Configuration... 5

More information

Primitive Specification for SSS Philip Hawkes, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries

Primitive Specification for SSS Philip Hawkes, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries Primitive Specification for SSS Philip Hawkes, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries {phawkes,mwp,ggr,miriamw}@qualcomm.com Qualcomm Australia Level 3, 230 Victoria Rd Gladesville NSW

More information

AquaCER with TTL OUTPUT

AquaCER with TTL OUTPUT INSTRUCTION MANUAL AquaCER with TTL OUTPUT DESCRIPTION: The AquaCER TTL is a hydrostatic pressure transmitter, with a capacitive ceramic sensor, and can withstand very high burst pressures. The applied

More information

TCG Algorithm Registry

TCG Algorithm Registry Family 2.0" Level 00 Revision 01.27 September 26, 2017 Committee Draft Contact: admin@trustedcomputinggroup.org Work in Progress: This document is an intermediate draft for comment only and is subject

More information

DULCOMETER Multi-parameter Controller dialog DACa

DULCOMETER Multi-parameter Controller dialog DACa Software manual DULCOMETER Multi-parameter Controller dialog DACa Modbus RTU EN Valid only in combination with the operating instructions for the Multi-parameter Controller dialog DACa. A2100 Please carefully

More information

The Roboteq Modbus Implementation User Manual

The Roboteq Modbus Implementation User Manual The Roboteq Modbus Implementation User Manual V1.1, December 21, 2017 Visit www.roboteq.com to download the latest revision of this manual Copyright 2017 Roboteq, Inc Copyright Roboteq Inc. 2018. All Rights

More information

M2M/DMTME Instruments Communication protocol. Technical specification V.2.1 2CSG445011D0201

M2M/DMTME Instruments Communication protocol. Technical specification V.2.1 2CSG445011D0201 M2M/DMTME Instruments Communication protocol 2CSG445011D0201 1 Setting up M2M/DMTME serial communication... 3 1.1 Serial network ID programming... 3 1.2 RS-485 communication interface... 3 1.3 Serial line

More information

Computer Control of the Advantage DRC 4+4

Computer Control of the Advantage DRC 4+4 Computer Control of the Advantage DRC 4+4 Biamp Systems, 14130 N.W. Science Park, Portland, Oregon 97229 U.S.A. (503) 641-7287 an affiliate of Rauland-Borg Corp. Introduction This document contains technical

More information

THE KEY RECOVERY ATTACKS CRYPTOGRAPHY IMPLEMENTATIONS AGAINST COMMERCIAL WHITE BOX SANGHWAN AHN(H2SPICE), LINE CORPORATION

THE KEY RECOVERY ATTACKS CRYPTOGRAPHY IMPLEMENTATIONS AGAINST COMMERCIAL WHITE BOX SANGHWAN AHN(H2SPICE), LINE CORPORATION THE KEY RECOVERY ATTACKS AGAINST COMMERCIAL WHITE BOX CRYPTOGRAPHY IMPLEMENTATIONS SANGHWAN AHN(H2SPICE), LINE CORPORATION AGENDA Introduction WHITE-BOX CRYPTOGRAPHY White-box Cryptanalysis Conclusion

More information

on a 35 mm top-hat rail (in accordance with DIN EN TH35) Ambient temperature Operation: C Storage: C

on a 35 mm top-hat rail (in accordance with DIN EN TH35) Ambient temperature Operation: C Storage: C Data sheet PCD1.B1020-A20 E-Line RIO 16DI, 4Rel Starting with FW 1.08.xx The L-Serie E-Line RIO modules are controlled via the RS-485 serial communication protocols S-Bus and Modbus for decentralised automation

More information

#include <stdio.h> // // Global CONSTANTS

#include <stdio.h> // // Global CONSTANTS Distance.c Author: Baylor Electromechanical Systems Operates on an external 18.432 MHz oscillator. Target: Cygnal Educational Development Board / C8051F020 Tool chain: KEIL C51 6.03 / KEIL EVAL C51 Utilizes

More information

UNPACKING THE PACKED UNPACKER: REVERSING AN ANDROID ANTI-ANALYSIS NATIVE LIBRARY Maddie Stone Google, USA

UNPACKING THE PACKED UNPACKER: REVERSING AN ANDROID ANTI-ANALYSIS NATIVE LIBRARY Maddie Stone Google, USA 3 5 October UNPACKING THE PACKED UNPACKER: REVERSING AN ANDROID ANTI-ANALYSIS NATIVE LIBRARY Maddie Stone Google, USA ABSTRACT maddiestone@google.com Malware authors implement many different techniques

More information

App Note Application Note: State-Driven Control of a dpasp using a Microchip PIC.

App Note Application Note: State-Driven Control of a dpasp using a Microchip PIC. Rev: 1.0.1 Date: 8 th July 2009 App Note - 207 Application Note: State-Driven Control of a dpasp using a Microchip PIC. This application note contains a total 3 files, if you have only this pdf text document,

More information

SPARC INTERNATIONAL. Version1 SPARC Keyboard Specification

SPARC INTERNATIONAL. Version1 SPARC Keyboard Specification SPARC INTERNATIONAL Version1 SPARC Keyboard Specification SPARC International, Inc. 3333 Bowers Ave., Suite 280, Santa Clara, CA 95054-3913, 408-748-9111. FAX 408-748-9777 1999, SPARC International Inc.

More information

Security Analysis of Lightweight Authentication Protocol from WISTP ,2) P, Xiao FuP P, Chen Dan-weiP P, Wang Ru-chuanP

Security Analysis of Lightweight Authentication Protocol from WISTP ,2) P, Xiao FuP P, Chen Dan-weiP P, Wang Ru-chuanP P P P Security Analysis of Lightweight Authentication Protocol from WISTP 23,2,3),2),2),2) Wang Shao-HuiP P, Xiao FuP P, hen Dan-weiP P, Wang Ru-chuanP P 2) ) P(ollege of omputer, Nanjing University of

More information

JDICON 400/500 JDICON 401/501. B Interface Description. Universal process controller

JDICON 400/500 JDICON 401/501. B Interface Description. Universal process controller JDICON 400/500 Universal process controller JDICON 401/501 Universal profile controller Universal profile generator B 70.3570.2 Interface Description 10.99/00371593 Contents 1 Introduction 5 1.1 Preface...

More information

BENCHTOP INSTRUMENT. Digital AC/DC Power Meter. Operation Manual V1.0

BENCHTOP INSTRUMENT. Digital AC/DC Power Meter. Operation Manual V1.0 BENCHTOP INSTRUMENT Digital AC/DC Power Meter Operation Manual V1.0 Default Setup Item Default Remark Version 0 Model No. Address 1 1 ~ 255 decimal Baud Rate 96 3 bps, 6 bps, 12 bps, 24 bps, 48 bps, 96

More information

GSA GAT PROTOCOL V Game Authentication Terminal

GSA GAT PROTOCOL V Game Authentication Terminal GSA GAT PROTOCOL V3.50.0 Game Authentication Terminal Gaming Standards Association GAT Technical Committee Released: 2010/12/13 Document ID: gsa-p0093.001.00 GAMINGSTANDARDS.COM GSA GAT Protocol, Document

More information

PCD1.W5200-A20. E-Line S-Serie RIO 8AO. Features. General technical data. Dimensions and installation

PCD1.W5200-A20. E-Line S-Serie RIO 8AO. Features. General technical data. Dimensions and installation Data sheet www.sbc-support.com PCD1.W5200-A20 E-Line S-Serie RI 8A The S-Serie E-Line RI modules are controlled via the RS-485 serial communication protocols S-Bus and Modbus for decentralised automation

More information

PCD1.A2000-A20. E-Line S-Serie RIO 6Rel 16A. Features. General technical data. Dimensions and installation

PCD1.A2000-A20. E-Line S-Serie RIO 6Rel 16A. Features. General technical data. Dimensions and installation Data sheet www.sbc-support.com PCD1.A2000-A20 E-Line S-Serie RI 6Rel 16A The S-Serie E-Line RI modules are controlled via the RS-485 serial communication protocols S-Bus and Modbus for decentralised automation

More information

Description. thanos ModBus. thanos SR ModBus

Description. thanos ModBus. thanos SR ModBus thanos ModBus & thanos SR ModBus Thermokon Sensortechnik GmbH - www.thermokon.de - email@thermokon.de 1 Index of changes Revision Date A B C 25.7.211 First draft 12.9.211 Version LQ added 22.9.211 Additional

More information

Intro (with some history) Issues ow, ow, ow, ow, ow, ow, ow, ow, Disclosure/Timeline CHIASMUS cipher

Intro (with some history) Issues ow, ow, ow, ow, ow, ow, ow, ow, Disclosure/Timeline CHIASMUS cipher Intro (with some history) Issues ow, ow, ow, ow, ow, ow, ow, ow, Disclosure/Timeline CHIASMUS cipher We made this: Erik Tews, Julian Wälde, and me independent discovery by Felix Schuster ECB first discovered

More information

ADV7610 SOFTWARE MANUAL SOFTWARE MANUAL. Documentation of the Register Maps. Rev. 0

ADV7610 SOFTWARE MANUAL SOFTWARE MANUAL. Documentation of the Register Maps. Rev. 0 ADV7610 SOFTWAE MANUAL Documentation of the egister Maps SOFTWAE MANUAL ev. 0 April 2013 egister Map TABLE OF CONTENTS Introduction... 3 Legal Terms and Conditions... 3 1 egister Tables... 4 1.1 IO...

More information

Modbus communication protocol

Modbus communication protocol TIP Thüringer Industrie Produkte GmbH Bahnhofstraße 26 99842 Ruhla GERMANY Tel. : +49 (0)36929/64029-0 Fax : +49 (0)36929/64029-99 info@stromzaehler.de www.stromzaehler.de Modbus communication protocol

More information

Motors I Automation I Energy I Transmission & Distribution I Coatings. Modbus RTU CFW701. User s Manual

Motors I Automation I Energy I Transmission & Distribution I Coatings. Modbus RTU CFW701. User s Manual Motors I Automation I Energy I Transmission & Distribution I Coatings Modbus RTU CFW701 User s Manual Modbus RTU User s Manual Series: CFW701 Language: English Document Number: 10001538593 / 00 Publication

More information

CSEE bit AES decryption. Shrivathsa Bhargav Larry Chen Abhinandan Majumdar Shiva Ramudit. Spring 2008 Project Design Document

CSEE bit AES decryption. Shrivathsa Bhargav Larry Chen Abhinandan Majumdar Shiva Ramudit. Spring 2008 Project Design Document CSEE 4840 128-bit AES decryption Shrivathsa Bhargav Larry Chen Abhinandan Majumdar Shiva Ramudit Spring 2008 Project Design Document CSEE 4840 Table of contents Abstract 1 1. Introduction 1 2. Hardware

More information

MODBUS Communication Protocol

MODBUS Communication Protocol MODBUS Communication Protocol for counters with integrated MODBUS or ETHERNET interface 7E.78/86 0212 7E.68 0212 7E.64 0210 7E.78/86 0412 7E.68 0412 6A and 80A 3phase counters with RS485 serial communication.

More information

Dell 7609WU RS232 Protocol Document

Dell 7609WU RS232 Protocol Document Dell 7609WU RS232 Protocol Document RS232 Projector Pin Assignment (Facing Projector) RS232 Serial Communication Cable Pin Assignment (Facing Cable) Pin Assignments RS232 PIN DESCRIPTION MINI DIN-6 1 2

More information

Installation, operation and maintenance manual

Installation, operation and maintenance manual Read this manual before installing, operating or maintaining this actuator. Failure to follow safety precautions and instructions could cause actuator failure and result in serious injury, death or property

More information

StarPRNT ios SDK User s Manual

StarPRNT ios SDK User s Manual StarPRNT ios SDK User s Manual Abstract This paper provides information about the StarPRNT ios SDK. It provides guidelines for our customers to build the StarPRNT application. Version History Release Date

More information

Specifiche generali protocollo MODBUS-RTU Rev. 10 (inglese) REVISIONS

Specifiche generali protocollo MODBUS-RTU Rev. 10 (inglese) REVISIONS Modbus-RTU Protocol (Mach Smart / Smart Più) Page 1 of 18 Specifiche generali protocollo MODBUS-RTU Rev. 10 (inglese) Written: U. T. ing. M. Bandini / A. Sangiorgi Verified: A. Q. sig. F. Adinolfi Approved:

More information

Modbus RTU CFW100. User s Manual. Phone: Fax: Web: -

Modbus RTU CFW100. User s Manual. Phone: Fax: Web:  - Modbus RTU CFW100 User s Manual Modbus RTU User s Manual Series: CFW100 Language: English Document Number: 10002909455 / 00 Publication Date: 06/2014 CONTENTS CONTENTS... 3 ABOUT THIS MANUAL... 5 ABBREVIATIONS

More information

Transferable State Attack on Iterated Hashing Functions. July 26, Brian Wallace. Ballast Security

Transferable State Attack on Iterated Hashing Functions. July 26, Brian Wallace. Ballast Security Transferable State Attack on Iterated Hashing Functions July 26, 2012 Brian Wallace Ballast Security 1 Abstract In this paper I will describe an attack on the iterated use of hashing functions used as

More information

1 #include <stdio.h> 2 #include <stdlib.h> 3 #include <string.h> 4 5 #define uint32_t unsigned long 6 #define uint8_t unsigned char 7 8 typedef

1 #include <stdio.h> 2 #include <stdlib.h> 3 #include <string.h> 4 5 #define uint32_t unsigned long 6 #define uint8_t unsigned char 7 8 typedef 1 #include 2 #include 3 #include 4 5 #define uint32_t unsigned long 6 #define uint8_t unsigned char 7 8 typedef struct _MD5CONTEXT { 9 uint32_t buf[4]; 10 uint32_t bits[2];

More information

Dell 4610X RS232 Protocol Document

Dell 4610X RS232 Protocol Document Dell 4610X RS232 Protocol Document RS232 Projector Pin Assignment (Facing Projector) RS232 Serial Communication Cable Pin Assignment (Facing Cable) Pin Assignments RS232 PIN DESCRIPTION MINI DIN-6 1 2

More information

Revision History. Rev Date Author Description A 27 Aug 99 Emil Farkas Initial release. Approvals: Author. VP. Engineering

Revision History. Rev Date Author Description A 27 Aug 99 Emil Farkas Initial release. Approvals: Author. VP. Engineering Carina Manual Carina Manual Revision History Style Sheet is: X:\Company\SmartMasters\Orion Filenames are: X:\Company\Manuals\ReferenceManual\Components\Carina\RevA\CarinaManual.lwp X:\Company\Manuals\ReferenceManual\Components\Carina\RevA\CarinaManualTitlePage

More information

Modbus Map: Conext XW/XW+ Device

Modbus Map: Conext XW/XW+ Device Map: Conext XW/XW+ Device 503-0246-01-01 Revision A.3 UNINTENDED OPERATION WARNING The use of this product with communications requires expertise in the design, operation, and programming of the device.

More information

Cryptographic Hashing Functions - MD5

Cryptographic Hashing Functions - MD5 Cryptographic Hashing Functions - MD5 Farhad Ahmed Sagar September 2016 1 Introduction Cryptographic hash functions take data input (or massage) and generate a fixed size result (or digest). The result

More information

Motors I Automation I Energy I Transmission & Distribution I Coatings. Modbus RTU CFW300. User s Manual

Motors I Automation I Energy I Transmission & Distribution I Coatings. Modbus RTU CFW300. User s Manual Motors I Automation I Energy I Transmission & Distribution I Coatings Modbus RTU CFW300 User s Manual Modbus RTU User s Manual Series: CFW300 Language: English Document Number: 10003806158 / 02 Publication

More information

Wireless M-Bus Host Controller Interface

Wireless M-Bus Host Controller Interface Wireless M-Bus Host Controller Interface Document ID: 4100/6404/0050 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY General Information Document Information File name WMBus_HCI_Spec.docx

More information

Dell S500/S500wi RS232 Protocol Document

Dell S500/S500wi RS232 Protocol Document Dell S500/S500wi RS232 Protocol Document RS232 Projector Pin Assignment (Facing Projector) RS232 Serial Communication Cable Pin Assignment (Facing Cable) Pin Assignments RS232 PIN DESCRIPTION MINI DIN-6

More information

ADV7612 SOFTWARE MANUAL SOFTWARE MANUAL. Documentation of the Register Maps. Rev. A

ADV7612 SOFTWARE MANUAL SOFTWARE MANUAL. Documentation of the Register Maps. Rev. A ADV7612 SOFTWAE MANUAL Documentation of the egister Maps SOFTWAE MANUAL ev. A December 2013 TABLE OF CONTENTS egister Map Introduction... 3 Legal Terms and Conditions... 3 1 egister Tables... 4 1.1 IO...

More information

Motors I Automation I Energy I Transmission & Distribution I Coatings. Modbus RTU CFW500. User s Manual

Motors I Automation I Energy I Transmission & Distribution I Coatings. Modbus RTU CFW500. User s Manual Motors I Automation I Energy I Transmission & Distribution I Coatings Modbus RTU CFW500 User s Manual Modbus RTU User s Manual Series: CFW500 Language: English Document Number: 10002253377 / 00 Publication

More information

RFID B1 Module User Manual V2.2 16/01/2018

RFID B1 Module User Manual V2.2 16/01/2018 RFID B1 Module User Manual V2.2 16/01/2018 Table of Contents 1 Introduction... 6 1.1 Device Overview... 6 1.2 Pinout... 7 1.3 Application... 8 2 Electrical Characteristics... 9 2.1 Test Conditions... 9

More information

Low visibility of Cyber Threats Invisible Attacks VPN, AD, PtH, PtT Invisible Network Traffic Google Drive, Dropbox Invisible Malware Task schedule, Wmi, Powershell 2016 Verint systems inc. All rights

More information

Deploying Cisco Service Provider Network Routing

Deploying Cisco Service Provider Network Routing SPROUTE Deploying Cisco Service Provider Network Routing Version 1.01 Lab Guide Text Part Number: 97-3149-02 Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems

More information

The Cuttle Cart 3. The Intellivision Customizable Menu Cartridge. from. Chad Schell of Schell s Electronics. Copyright 2007 Schell s Electronics

The Cuttle Cart 3. The Intellivision Customizable Menu Cartridge. from. Chad Schell of Schell s Electronics. Copyright 2007 Schell s Electronics The Cuttle Cart 3 The Intellivision Customizable Menu Cartridge from Chad Schell of Schell s Electronics Copyright 2007 Schell s Electronics Setting up the MicroSD Card To use the Cuttle Cart 3 (CC3) to

More information

RFID B1 Module User Manual

RFID B1 Module User Manual RFID B1 Module User Manual V1.202 Table of Contents 1 Introduction... 6 1.1 Device Overview... 6 1.2 Pinout... 7 1.3 Application... 8 2 Electrical Characteristics... 9 2.1 Test Conditions... 9 2.2 Absolute

More information

Technical Information. Command overview of Vision Systems

Technical Information. Command overview of Vision Systems Technical Information Command overview of Vision Systems Image analysis command Grab image 0x01 X X X X Shutter speed 0x07 X X X X Synchronous flash 0x49 X X X X Video mode 0x00 X X Display 0x05 X X X

More information

RTX64. Supported Network Interface Cards IntervalZero, Inc. IZ-DOC-X R32 March 2017

RTX64. Supported Network Interface Cards IntervalZero, Inc. IZ-DOC-X R32 March 2017 RTX64 Supported Network Interface Cards 2017 IntervalZero, Inc. IZ-DOC-X64-0088-R32 March 2017 The Supported Network Interface Cards guide lists the NIC drivers that are provided with RTX64 for use with

More information

RTX64. Supported Network Interface Cards

RTX64. Supported Network Interface Cards RTX64 Supported Network Interface Cards 2017 IntervalZero, Inc. IZ-DOC-X64-0088-R34 October 2017 The Supported Network Interface Cards guide lists the NIC drivers that are provided with RTX64 for use with

More information

DATA SHEET. article numbers P125-1b & P125-1g

DATA SHEET. article numbers P125-1b & P125-1g LC 16.2 TREND DATA SHEET article numbers P125-1b & P125-1g Pottery House, Pottery Road, Dun Laoghaire, Co. Dublin, Ireland. Tel: +353-1-2350279 Fax: +353-1-2350361 Am Gneisenauflöz 6, 66538 Neunkirchen,

More information

ANM071. Keypad decoding technique using TSC80251G1. 1. Description 2. TSC80251G Keyboard interrupt Power down mode

ANM071. Keypad decoding technique using TSC80251G1. 1. Description 2. TSC80251G Keyboard interrupt Power down mode Keypad decoding technique using TSC80251G1 by François Fosse Technical Marketing Engineer Temic France 1. Description This application note demonstrates the use of a matrix keypad including wake up from

More information

ECE251: Intro to Microprocessors Name: Solutions Mid Term Exam October 4, 2018

ECE251: Intro to Microprocessors Name: Solutions Mid Term Exam October 4, 2018 ECE251: Intro to Microprocessors Name: Solutions Mid Term Exam October 4, 2018 (PRINT) Instructions: No calculators, books, or cell phones; do not communicate with any other student. One side of a single

More information

Return oriented programming

Return oriented programming Return oriented programming TOOR - Computer Security Hallgrímur H. Gunnarsson Reykjavík University 2012-05-04 Introduction Many countermeasures have been introduced to foil EIP hijacking: W X: Prevent

More information

Best of Oracle Security by Red-Database-Security

Best of Oracle Security by Red-Database-Security Best of Oracle Security 2010 2010 by Red-Database-Security Introduction Oracle Critical Patch Updates Passwords & Encryption Auditing & Database Vault Intercept network traffic PL/SQL Unwrapper Oracle

More information

WTS family of Tactile Sensor Modules - Command Set Reference Manual - Firmware Version March 2013

WTS family of Tactile Sensor Modules - Command Set Reference Manual - Firmware Version March 2013 WTS family of Tactile Sensor Modules - Command Set Reference Manual - Firmware Version 1.2.0 March 2013 Contents 1 Introduction... 4 1.1 Data Acquisition... 4 1.2 Sensor Cell Numbers... 5 1.3 Connecting

More information

Aptio 5.x Status Codes

Aptio 5.x Status Codes Checkpoints & Beep Codes for Debugging Document Revision 2.0 Revision Date: April 10, 2014 Public Document Copyright 2014 American Megatrends, Inc. 5555 Oakbrook Parkway Suite 200 Norcross, GA 30093 Legal

More information

APPROACHES TO PHISHING IDENTIFICATION USING MATCH AND PROBABILISTIC DIGITAL FINGERPRINTING TECHNIQUES

APPROACHES TO PHISHING IDENTIFICATION USING MATCH AND PROBABILISTIC DIGITAL FINGERPRINTING TECHNIQUES APPROACHES TO PHISHING IDENTIFICATION USING MATCH AND PROBABILISTIC DIGITAL FINGERPRINTING TECHNIQUES Jonathan Zdziarski Weilai Yang Paul Judge CipherTrust, Inc. CipherTrust, Inc. CipherTrust, Inc. jonathan.zdziarski@ciphertrust.com

More information